Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: October 18, 2022
image from Balancing Risk & Reward

Balancing Risk & Reward

This report is based on cybercrime attacks detected by the Digital Identity Network from July-December 2021, during near real-time analysis of consumer interactions across the customer journey, from new account creations, logins, payments and other non-core transactions such as password resets and transfers.

(more available)
Added: September 28, 2022
image from Women in Cybersecurity: Spanning the Career Life Cycle

Women in Cybersecurity: Spanning the Career Life Cycle

For our survey, we targeted successful women working in varied roles in the cybersecurity community, and we queried them about everything from breaking into the field and gaining career momentum to choosing a specialty and finding ways to remain relevant. In this report, we provide lessons learned and advice on how a women in cybersecurity or a woman wanting to enter this field can lay a foundation to ensure success.

(more available)
Added: September 20, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is based on a comprehensive survey of 775 cybersecurity professionals conducted in January 2022, to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: August 26, 2022
image from 2022 Threat Review

2022 Threat Review

However, 2021 is most likely to be remembered as the year that ransomeware epidemic isn’t over, and it may not even have peaked, but the threat it poses to businesses, supply-chains and critical infrastructure is no longer in doubt, and the forces arrayed against it have never been so formidable.

(more available)
Added: July 18, 2022
image from 2022 Attack Surface Management Maturity Report

2022 Attack Surface Management Maturity Report

The 2022 Attack Surface Management Maturity Report has been produced by Cybersecurity Insiders, the 500,000 member online community of information security professionals, to explore the current state, exposures, and priorities that organizations need to consider to fortify their security posture.

(more available)
Added: July 5, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. To do so, service providers are embracing ultra-low-latency designs, fully automated software delivery and increased levels of operating efficiency.

(more available)
Added: June 21, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from Blackberry 2022 Threat Report

Blackberry 2022 Threat Report

The Blackberry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a high-level look at issues affecting cybersecurity across the globe, both directly and indirectly. It covers elements of critical infrastructure exploitation, adversarial artificial intelligence (Al), initial access brokers (IABs), critical event management (CEM), extended detection and response (XDR), and other issues shaping our current security environment.

(more available)
Added: June 13, 2022
image from The State of Stalkerware in 2021

The State of Stalkerware in 2021

This report shows data from 2021 that was affected by stalkerware globally.

Added: April 13, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.

(more available)
Added: April 6, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from Egress Data Loss Prevention Report 2021

Egress Data Loss Prevention Report 2021

A survey of 500 IT leaders and 2000 remote-working employees within the UK and US on data losses. Focusing on human interaction issues such as email and insider threat events

(more available)
Added: July 15, 2021
image from The State of Stalkerware in 2020

The State of Stalkerware in 2020

This report aims to examine the issue of stalkerware. They present data to understand the changes and scale of the problem in 2020.

(more available)
Added: February 28, 2021
image from Securing Your Apps in the Borderless Cloud

Securing Your Apps in the Borderless Cloud

This report takes a look at the public cloud, adoption trends, security concerns, app vulnerabilities, and a variety of related issues faced with rapid cloud adoption.

(more available)
Added: February 22, 2021
image from Cybersecurity Awareness Month Survey Report September 2020

Cybersecurity Awareness Month Survey Report September 2020

This study was conducted to better understand consumer behavior around internet-connected devices and perceptions of security. It looks into generational differences in perception and behavior changes during COVID-19.

(more available)
Added: November 6, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats.

(more available)
Added: October 29, 2020
image from Online Security Survey

Online Security Survey

This infographic is based off of a survey of 3,000 US consumer to better understand behaviors and beliefs around online security.

(more available)
Added: October 25, 2020
image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. The results provide insights into the latest trends in user behavior, challenges and gaps related to phishing attacks.

(more available)
Added: October 20, 2020
image from What's Lurking in the Shadows 2020?

What's Lurking in the Shadows 2020?

This report provides recommendations on how companies can manage the threat posed by shadow IoT devices.

Added: September 27, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.

Added: September 16, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 12:08 UTC (build b1d7be4)